Cyber Security Training: How to Phish-proof Your Employees

Nov 26, 2018 9:00:00 AM / by Liege Payne posted in cyber security, Security, phishing

0 Comments

Drastically Reduce Vulnerabilities in Only 90 Days

Continuing our discussion of cyber security training for employees of regulated organizations, this post examines the growing threats from phishing schemes and suggests training that will reduce the possibility that your staff will inadvertently unleash a disastrous attack on your systems, data and client assets.

Read More

Cyber Security Training for Employees: Protecting New Personal Devices

Nov 7, 2018 8:42:00 AM / by Eric Benda, CEO posted in cyber security, cybersecurity

0 Comments

Don't Let Their Holiday Technology Gifts Become 'Gifts' for Hackers

Our last post discussed the importance of cyber security training for employees. Along those lines, at holiday time we always make sure to alert our customers and their staffs to a particular concern: devices received as personal gifts that will also be used for business. If they’re not set up according to best practices by your network security team, they could represent a serious cyber security threat and compliance problem for your regulated business.

Read More

Is AI Snooping On Your Office Conversations? Cyber Security Training Can Keep Them Confidential

Oct 11, 2018 5:53:03 PM / by Eric Benda, CEO posted in cyber security

2 Comments

Take Action Before Letting Alexa, Siri and Bixby Into Your Private Meetings!

Are our artificial intelligence devices listening to us all the time and saving our conversations? The fact is, we just don’t know. Although most of the alarm has centered around home use of these devices, it’s time that we consider the potential negative implications on data security and privacy in the workplace – especially as regards regulated businesses. So what do we know?

Read More

Recent DOJ Hacker Charges a Reminder: Do Network Penetration Testing, Patching for Cyber Security

Sep 27, 2018 8:30:00 AM / by Eric Benda, CEO posted in assessment, cyber security, penetration testing

0 Comments

Earlier this month, the U.S. Department of Justice filed charges against a N. Korean hacker who they say was behind such infamous incidents as the WannaCry ransomware attack, the attack on SONY over its release of a film unfavorable to N. Korean leader Kim Jung Un, and the $81 million Bangladesh Bank heist.

The DOJ’s action is a reminder that businesses are vulnerable and must take proactive steps to assure cyber security – especially regulated companies. These steps include network penetration testing, ongoing identification and patching of software and network vulnerabilities and other measures.

Read More

Get Our Cyber Security Self-Assessment Checklist

Sep 25, 2018 12:26:43 PM / by Eric Benda, CEO posted in cyber security, Security, IT Support, assessment

0 Comments

Another Free Tool to Defend Against Hacker Threats

Here at Soundshore Technology Group we are increasingly focused on cyber security. We’ve just launched a second tool – a Cyber Security Self-Assessment Checklist -- that companies can download for free to help them look in the right places and ask the right questions to assure their networks and systems are defended. This follows a special offer for new and prospective customers that we launched a few weeks ago – a free external Cyber Security Vulnerability Assessment, a process that we perform.

Read More

Special Offer: Free Cyber Security Vulnerability Assessment Available to New STG Customers

Jul 30, 2018 3:50:44 PM / by Eric Benda, CEO posted in cyber security, Security, IT Support, assessment

0 Comments

External Scan Is First Step to Protecting Financial Firms’ Client Data/Assets, Enhancing Reputation

We’re introducing an important offer for new and prospective customers – a complimentary Cyber Security Network Vulnerability Assessment. This offer addresses the critical need for financial services companies to be able to demonstrate proactive efforts to assure the security of their technology networks. Read on to learn why we’ve decided to do this and to get more details about the offer.

Read More

What to expect from an SEC Audit of Your DR & BCP

Oct 23, 2015 7:45:00 AM / by Liege Payne posted in Compliance, Business Continuity Plan, DR, IT Support, SEC, Audit, Disaster Recover, BCP

0 Comments

SEC audits are never welcome, but with this blog entry you can at the very least know what to expect and what to prepare for with your Disaster Recovery and Business Continuity Plan

Read More

Soundshore Technology Group LLC Completes Acquisition of Westside Automation and Opens Los Angeles Office

Oct 23, 2015 7:45:00 AM / by Liege Payne posted in Business Continuity Plan, Office Move, IT Relocation, IT Support, Disaster Recover, BCP, Soundshore

0 Comments

Read More

Don't Sign That Office Lease Yet! 5 Tips for IT Relocation.

Oct 23, 2015 7:45:00 AM / by Liege Payne posted in Business Continuity Plan, Security, Office Move, ISP, IT Relocation

0 Comments

So you have finally decided on the big office move?  Lease terms are favorable now and you may want better, bigger/smaller, more convenient, less expensive office space?

Read More

Soundshore Technology Group Expands West Coast Presence with Addition of Three San Francisco Area Offices

Oct 23, 2015 7:44:00 AM / by STG Blogger posted in STG

0 Comments

Soundshore Technology Group Expands West Coast Presence with Addition of Three San Francisco Area Offices

Read More